首页 > 最新文献

2022 IEEE 8th International Conference on Network Softwarization (NetSoft)最新文献

英文 中文
Always-Sustainable Software Security 始终可持续的软件安全
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844077
Vincent Lefebvre, Gianni Santinelli
In this paper, we depict a new approach applicable to any types of software security solutions with the aim of regulating the protection level according to measured execution conditions. We define the inherent security requirement for this regulation and for that sake, a scalable use of Intel SGX trusted execution environment. We expose the merits of the solution assembling sustainability and security and describe a first implementation with its results and elaborate future works.
在本文中,我们描述了一种适用于任何类型的软件安全解决方案的新方法,目的是根据测量的执行条件来调节保护级别。我们为此规定定义了固有的安全需求,并为此定义了可扩展使用的Intel SGX可信执行环境。我们揭示了将可持续性和安全性结合在一起的解决方案的优点,并描述了第一个实现及其结果,并详细说明了未来的工作。
{"title":"Always-Sustainable Software Security","authors":"Vincent Lefebvre, Gianni Santinelli","doi":"10.1109/NetSoft54395.2022.9844077","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844077","url":null,"abstract":"In this paper, we depict a new approach applicable to any types of software security solutions with the aim of regulating the protection level according to measured execution conditions. We define the inherent security requirement for this regulation and for that sake, a scalable use of Intel SGX trusted execution environment. We expose the merits of the solution assembling sustainability and security and describe a first implementation with its results and elaborate future works.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121541040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Digital Replica using Neural-Network-based Network Node Modeling 使用基于神经网络的网络节点建模的网络数字复制
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844103
K. Hattori, T. Korikawa, Chikako Takasaki, Hidenari Oowada, M. Shimizu, N. Takaya
Future network infrastructures will need to provide network services safely and rapidly under complex conditions that include accommodating many devices and multiple access lines such as 5G / 6G supported by multiple carriers. For this reason, the efficiency of the pre-verification needs to be improved for a large number of various devices to ensure safety and reliability. Furthermore, future carrier networks will support network disaggregation technologies to leverage best-of-breed technology from different suppliers in accordance with service requirements. Therefore, it is necessary to verify combinations of a large number of devices and the components constituting the network infrastructure to achieve optimal settings. In this paper, we propose the concept of network digital replica and a method of network node modeling to predict the performance of network nodes using neural-network-based machine learning. A network digital replica, which is a copy of a physical network, can be created in a digital domain not only to classify the specifications of network nodes but also to verify the performance for network devices digitally. We evaluate the effectiveness of the proposed method, which predicts the throughput and processing delays of actual routers on the basis of the sets of learning data including router settings and traffic conditions.
未来的网络基础设施将需要在复杂的条件下安全、快速地提供网络服务,包括容纳多设备和多接入线路,如多个运营商支持的5G / 6G。因此,对于大量的各种设备,需要提高预验证的效率,以确保安全性和可靠性。此外,未来的运营商网络将支持网络分解技术,以根据业务需求利用来自不同供应商的最佳技术。因此,有必要验证大量设备和组成网络基础设施的组件的组合,以实现最佳设置。在本文中,我们提出了网络数字复制的概念和网络节点建模的方法,利用基于神经网络的机器学习来预测网络节点的性能。网络数字副本是物理网络的副本,可以在数字域中创建网络数字副本,不仅可以对网络节点的规格进行分类,还可以对网络设备的性能进行数字验证。我们评估了该方法的有效性,该方法基于包括路由器设置和流量条件在内的学习数据集来预测实际路由器的吞吐量和处理延迟。
{"title":"Network Digital Replica using Neural-Network-based Network Node Modeling","authors":"K. Hattori, T. Korikawa, Chikako Takasaki, Hidenari Oowada, M. Shimizu, N. Takaya","doi":"10.1109/NetSoft54395.2022.9844103","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844103","url":null,"abstract":"Future network infrastructures will need to provide network services safely and rapidly under complex conditions that include accommodating many devices and multiple access lines such as 5G / 6G supported by multiple carriers. For this reason, the efficiency of the pre-verification needs to be improved for a large number of various devices to ensure safety and reliability. Furthermore, future carrier networks will support network disaggregation technologies to leverage best-of-breed technology from different suppliers in accordance with service requirements. Therefore, it is necessary to verify combinations of a large number of devices and the components constituting the network infrastructure to achieve optimal settings. In this paper, we propose the concept of network digital replica and a method of network node modeling to predict the performance of network nodes using neural-network-based machine learning. A network digital replica, which is a copy of a physical network, can be created in a digital domain not only to classify the specifications of network nodes but also to verify the performance for network devices digitally. We evaluate the effectiveness of the proposed method, which predicts the throughput and processing delays of actual routers on the basis of the sets of learning data including router settings and traffic conditions.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122752371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Encrypted Network Traffic Classification using Self-supervised Learning 使用自监督学习的加密网络流量分类
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844044
Md. Shamim Towhid, Nashid Shahriar
Network traffic classification is used in many applications including network provisioning, malware detection, resource management, and so on. In modern networks, use of encrypted protocols is a norm rather than an exception. Existing network traffic classification techniques fall short in working with encrypted traffic. Although deep learning based techniques have been shown to perform well in the case of encrypted traffic classification, they require an abundance of labeled data to achieve high accuracy. However, labeled data is rarely available in sufficient volumes in real network settings as they require domain experts to annotate data with labels. Therefore, in this paper, we propose a self-supervised approach that can achieve high accuracy on encrypted network traffic classification with a few labeled data. The proposed method is evaluated on three publicly available datasets. The empirical result shows that our method not only achieves high accuracy on encrypted traffic but also has the ability to apply the acquired knowledge on a different dataset. In our experiments, our method outperforms the state-of-the-art baseline methods by ~3% in terms of accuracy even with a much lower volume of labeled data.
网络流分类用于许多应用程序,包括网络供应、恶意软件检测、资源管理等。在现代网络中,使用加密协议是一种常态,而不是例外。现有的网络流量分类技术在处理加密流量方面存在不足。尽管基于深度学习的技术已被证明在加密流量分类的情况下表现良好,但它们需要大量标记数据才能达到高精度。然而,在真实的网络环境中,标记的数据很少有足够的数量,因为它们需要领域专家用标签注释数据。因此,在本文中,我们提出了一种自监督方法,该方法可以在少量标记数据的情况下对加密网络流量分类达到较高的准确率。该方法在三个公开可用的数据集上进行了评估。实验结果表明,该方法不仅在加密流量上达到了较高的准确率,而且具有将所获得的知识应用于不同数据集的能力。在我们的实验中,即使在标记数据量少得多的情况下,我们的方法在准确性方面也比最先进的基线方法高出约3%。
{"title":"Encrypted Network Traffic Classification using Self-supervised Learning","authors":"Md. Shamim Towhid, Nashid Shahriar","doi":"10.1109/NetSoft54395.2022.9844044","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844044","url":null,"abstract":"Network traffic classification is used in many applications including network provisioning, malware detection, resource management, and so on. In modern networks, use of encrypted protocols is a norm rather than an exception. Existing network traffic classification techniques fall short in working with encrypted traffic. Although deep learning based techniques have been shown to perform well in the case of encrypted traffic classification, they require an abundance of labeled data to achieve high accuracy. However, labeled data is rarely available in sufficient volumes in real network settings as they require domain experts to annotate data with labels. Therefore, in this paper, we propose a self-supervised approach that can achieve high accuracy on encrypted network traffic classification with a few labeled data. The proposed method is evaluated on three publicly available datasets. The empirical result shows that our method not only achieves high accuracy on encrypted traffic but also has the ability to apply the acquired knowledge on a different dataset. In our experiments, our method outperforms the state-of-the-art baseline methods by ~3% in terms of accuracy even with a much lower volume of labeled data.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125966867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Intelligent Admission and Placement of O-RAN Slices Using Deep Reinforcement Learning 使用深度强化学习的O-RAN切片的智能接纳和放置
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844089
Nabhasmita Sen, A. Franklin
Network slicing is a key feature of 5G and beyond networks. Intelligent management of slices is important for reaping its highest benefits which needs further exploration. Focusing only on one goal as revenue maximization or cost minimization may not generate the highest profit for infrastructure providers in the long run. In this paper we jointly consider online admission and placement of Radio Access Network (RAN) slices with two objectives - a) maximizing revenue from accepting slices which are more profitable in the long run, and b) minimizing the cost to deploy them in Open RAN (O-RAN) enabled network by placing the slices efficiently. We formulate it as an optimization problem and propose a Deep Reinforcement Learning (DRL) based solution using Proximal Policy optimization (PPO). We compare our model with a state-of-the-art DRL based admission control solution and a greedy heuristic. We show that our proposed solution can efficiently adapt to dynamic load conditions. We also show that the proposed solution results in better performance to maximize the overall profit for infrastructure providers in comparison to the baselines.
网络切片是5G及以后网络的一个关键特性。切片智能管理是实现切片最大效益的重要途径,有待进一步探索。从长远来看,只关注一个目标,如收入最大化或成本最小化,可能不会为基础设施提供商带来最高的利润。在本文中,我们共同考虑无线接入网(RAN)片的在线接纳和放置,有两个目标- a)从长期来看更有利可图的片中获得最大收益,b)通过有效放置片来最小化在开放RAN (O-RAN)支持的网络中部署它们的成本。我们将其表述为一个优化问题,并提出了一个基于深度强化学习(DRL)的解决方案,使用近端策略优化(PPO)。我们将我们的模型与最先进的基于DRL的准入控制解决方案和贪婪启发式进行比较。结果表明,该方法能有效地适应动态载荷条件。我们还表明,与基线相比,所建议的解决方案可以带来更好的性能,从而使基础设施提供商的整体利润最大化。
{"title":"Intelligent Admission and Placement of O-RAN Slices Using Deep Reinforcement Learning","authors":"Nabhasmita Sen, A. Franklin","doi":"10.1109/NetSoft54395.2022.9844089","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844089","url":null,"abstract":"Network slicing is a key feature of 5G and beyond networks. Intelligent management of slices is important for reaping its highest benefits which needs further exploration. Focusing only on one goal as revenue maximization or cost minimization may not generate the highest profit for infrastructure providers in the long run. In this paper we jointly consider online admission and placement of Radio Access Network (RAN) slices with two objectives - a) maximizing revenue from accepting slices which are more profitable in the long run, and b) minimizing the cost to deploy them in Open RAN (O-RAN) enabled network by placing the slices efficiently. We formulate it as an optimization problem and propose a Deep Reinforcement Learning (DRL) based solution using Proximal Policy optimization (PPO). We compare our model with a state-of-the-art DRL based admission control solution and a greedy heuristic. We show that our proposed solution can efficiently adapt to dynamic load conditions. We also show that the proposed solution results in better performance to maximize the overall profit for infrastructure providers in comparison to the baselines.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125474358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
MiddleNet: A High-Performance, Lightweight, Unified NFV and Middlebox Framework 中间件:一个高性能、轻量级、统一的NFV和中间件框架
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844083
Ziteng Zeng, Leslie Monis, Shixiong Qi, K. Ramakrishnan
Traditional network resident functions (e.g., firewalls, network address translation) and middleboxes (caches, load balancers) have moved from purpose-built appliances to software-based components. However, L2/L3 network functions (NFs) are being implemented on Network Function Virtualization (NFV) platforms that extensively exploit kernel-bypass technology. They often use DPDK for zero-copy delivery and high performance. On the other hand, L4/L7 middleboxes, which usually require full network protocol stack support, take advantage of a full-fledged kernel-based system with a greater emphasis on functionality. Thus, L2/L3 NFs and middleboxes continue to be handled by distinct platforms on different nodes.This paper proposes MiddleNet that seeks to overcome this dichotomy by developing a unified network resident function framework that supports L2/L3 NFs and L4/L7 middleboxes. MiddleNet supports function chains that are essential in both NFV and middlebox environments. MiddleNet uses DPDK for zero-copy packet delivery without interrupt-based processing, to enable the ‘bump-in-the-wire’ L2/L3 processing performance required of NFV. To support L4/L7 middlebox functionality, MiddleNet utilizes a consolidated, kernel-based protocol stack processing, avoiding a dedicated protocol stack for each function. MiddleNet fully exploits the event-driven capabilities provided by the extended Berkeley Packet Filter (eBPF) and seamlessly integrates it with shared memory for high-performance communication in L4/L7 middlebox function chains. The overheads for MiddleNet are strictly load-proportional, without needing the dedicated CPU cores of DPDK-based approaches. MiddleNet supports flow-dependent packet processing by leveraging Single Root I/O Virtualization (SR-IOV) to dynamically select packet processing needed (Layer 2 to Layer 7). Our experimental results show that MiddleNet can achieve high performance in such a unified environment.
传统的网络驻留功能(例如,防火墙、网络地址转换)和中间设备(缓存、负载平衡器)已经从专用设备转移到基于软件的组件。然而,L2/L3网络功能(NFs)正在广泛利用内核旁路技术的网络功能虚拟化(NFV)平台上实现。他们经常使用DPDK来实现零拷贝交付和高性能。另一方面,通常需要完整的网络协议栈支持的L4/L7中间件利用了一个更强调功能的、成熟的基于内核的系统。因此,L2/L3 NFs和中间盒继续由不同节点上的不同平台处理。本文提出的midlenet旨在通过开发支持L2/L3 NFs和L4/L7中间盒的统一网络驻留功能框架来克服这种二分法。midlenet支持在NFV和middlebox环境中都必不可少的功能链。midlenet使用DPDK进行零拷贝数据包传输,无需基于中断的处理,以实现NFV所需的“线中碰撞”L2/L3处理性能。为了支持L4/L7中间盒功能,MiddleNet利用统一的、基于内核的协议栈处理,避免了为每个功能使用专用的协议栈。midlenet充分利用了扩展伯克利包过滤器(eBPF)提供的事件驱动功能,并将其与共享内存无缝集成,在L4/L7中间盒功能链中实现高性能通信。midlenet的开销严格按负载比例计算,不需要基于dpdk方法的专用CPU内核。通过利用单根I/O虚拟化(SR-IOV)动态选择所需的包处理(第2层到第7层),middleet支持流依赖的数据包处理。实验结果表明,在这种统一的环境下,middleet可以实现高性能。
{"title":"MiddleNet: A High-Performance, Lightweight, Unified NFV and Middlebox Framework","authors":"Ziteng Zeng, Leslie Monis, Shixiong Qi, K. Ramakrishnan","doi":"10.1109/NetSoft54395.2022.9844083","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844083","url":null,"abstract":"Traditional network resident functions (e.g., firewalls, network address translation) and middleboxes (caches, load balancers) have moved from purpose-built appliances to software-based components. However, L2/L3 network functions (NFs) are being implemented on Network Function Virtualization (NFV) platforms that extensively exploit kernel-bypass technology. They often use DPDK for zero-copy delivery and high performance. On the other hand, L4/L7 middleboxes, which usually require full network protocol stack support, take advantage of a full-fledged kernel-based system with a greater emphasis on functionality. Thus, L2/L3 NFs and middleboxes continue to be handled by distinct platforms on different nodes.This paper proposes MiddleNet that seeks to overcome this dichotomy by developing a unified network resident function framework that supports L2/L3 NFs and L4/L7 middleboxes. MiddleNet supports function chains that are essential in both NFV and middlebox environments. MiddleNet uses DPDK for zero-copy packet delivery without interrupt-based processing, to enable the ‘bump-in-the-wire’ L2/L3 processing performance required of NFV. To support L4/L7 middlebox functionality, MiddleNet utilizes a consolidated, kernel-based protocol stack processing, avoiding a dedicated protocol stack for each function. MiddleNet fully exploits the event-driven capabilities provided by the extended Berkeley Packet Filter (eBPF) and seamlessly integrates it with shared memory for high-performance communication in L4/L7 middlebox function chains. The overheads for MiddleNet are strictly load-proportional, without needing the dedicated CPU cores of DPDK-based approaches. MiddleNet supports flow-dependent packet processing by leveraging Single Root I/O Virtualization (SR-IOV) to dynamically select packet processing needed (Layer 2 to Layer 7). Our experimental results show that MiddleNet can achieve high performance in such a unified environment.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133311887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
NetSoft 2022 Cover Page NetSoft 2022封面页
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844058
{"title":"NetSoft 2022 Cover Page","authors":"","doi":"10.1109/NetSoft54395.2022.9844058","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844058","url":null,"abstract":"","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"654 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132863275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DeepCrypt - Deep Learning for QoE Monitoring and Fingerprinting of User Actions in Adaptive Video Streaming 深度学习用于QoE监控和自适应视频流中用户动作的指纹识别
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844113
P. Casas, Michael Seufert, Sarah Wassermann, B. Gardlo, Nikolas Wehner, R. Schatz
We introduce DeepCrypt, a deep-learning based approach to analyze YouTube adaptive video streaming Quality of Experience (QoE) from the Internet Service Provider (ISP) perspective, relying exclusively on the analysis of encrypted network traffic. Using raw features derived on-line from the encrypted stream of bytes, DeepCrypt infers six different video QoE indicators capturing the user-perceived performance of the service, including the initial playback delay, the number and frequency of rebuffering events, the video playback quality and encoding bitrate, and the number of quality changes. DeepCrypt offers deep visibility into the behavior of the end-user, enabling the fingerprinting and detection of different user actions on the video player, such as video pauses and playback scrubbing (forward, backward, out-of-buffer), offering a complete visibility on the video streaming process from in-network traffic measurements. Evaluations over a large and heterogeneous dataset composed of mobile and fixed-line measurements, using the YouTube HTML5 player, the native YouTube mobile app, as well as a generic HTML5 video player built on top of open source libraries, and considering measurements collected at different ISPs, confirm the out-performance of DeepCrypt over previously used shallow-learning models, and its generalization to different video players and network setups.
我们介绍了DeepCrypt,一种基于深度学习的方法,从互联网服务提供商(ISP)的角度分析YouTube自适应视频流体验质量(QoE),完全依赖于对加密网络流量的分析。使用从加密字节流中获得的原始特征,DeepCrypt推断出六种不同的视频QoE指标,这些指标捕获了用户感知的服务性能,包括初始播放延迟、重新缓冲事件的数量和频率、视频播放质量和编码比特率,以及质量变化的数量。DeepCrypt提供了对最终用户行为的深度可见性,能够识别和检测视频播放器上不同的用户操作,例如视频暂停和播放洗涤(向前,向后,超出缓冲区),从网络内流量测量中提供对视频流过程的完整可见性。使用YouTube HTML5播放器、原生YouTube移动应用程序以及基于开源库构建的通用HTML5视频播放器,对由移动和固定线路测量组成的大型异构数据集进行评估,并考虑在不同isp收集的测量结果,确认DeepCrypt优于先前使用的浅层学习模型,并将其推广到不同的视频播放器和网络设置。
{"title":"DeepCrypt - Deep Learning for QoE Monitoring and Fingerprinting of User Actions in Adaptive Video Streaming","authors":"P. Casas, Michael Seufert, Sarah Wassermann, B. Gardlo, Nikolas Wehner, R. Schatz","doi":"10.1109/NetSoft54395.2022.9844113","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844113","url":null,"abstract":"We introduce DeepCrypt, a deep-learning based approach to analyze YouTube adaptive video streaming Quality of Experience (QoE) from the Internet Service Provider (ISP) perspective, relying exclusively on the analysis of encrypted network traffic. Using raw features derived on-line from the encrypted stream of bytes, DeepCrypt infers six different video QoE indicators capturing the user-perceived performance of the service, including the initial playback delay, the number and frequency of rebuffering events, the video playback quality and encoding bitrate, and the number of quality changes. DeepCrypt offers deep visibility into the behavior of the end-user, enabling the fingerprinting and detection of different user actions on the video player, such as video pauses and playback scrubbing (forward, backward, out-of-buffer), offering a complete visibility on the video streaming process from in-network traffic measurements. Evaluations over a large and heterogeneous dataset composed of mobile and fixed-line measurements, using the YouTube HTML5 player, the native YouTube mobile app, as well as a generic HTML5 video player built on top of open source libraries, and considering measurements collected at different ISPs, confirm the out-performance of DeepCrypt over previously used shallow-learning models, and its generalization to different video players and network setups.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"16 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120911470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Demonstration of 5G-MEC assisted Location Services for Mission Critical Applications 5G-MEC辅助关键任务应用定位服务演示
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844033
S. Tambe, Shwetha Vittal, Pratik Abhijeet Bendre, Supriya Kumari, A. Franklin
Advancements in 5G and edge computing infrastructure increase the need to deploy location-based services for mission-critical applications like Vehicle to Everything (V2X) and Intelligent Transport System (ITS). In this demonstration, we showcase the location service capabilities of our 5G Core (5GC), coupled with Multi-access Edge Computing (MEC) for delay-sensitive ultra-Reliable Low Latency Communication (uRLLC) service types like V2X and ITS. We believe that this work will guide Mobile Network Operators in building a location assistance service system for emergencies and delay-critical applications.
5G和边缘计算基础设施的进步增加了为车辆到一切(V2X)和智能交通系统(ITS)等关键任务应用部署基于位置的服务的需求。在本次演示中,我们展示了5G核心(5GC)的位置服务功能,以及用于V2X和ITS等延迟敏感超可靠低延迟通信(uRLLC)服务类型的多访问边缘计算(MEC)。我们相信这项工作将会指引流动网络营办商建立一个定位协助服务系统,以应付紧急情况和延误关键的应用。
{"title":"Demonstration of 5G-MEC assisted Location Services for Mission Critical Applications","authors":"S. Tambe, Shwetha Vittal, Pratik Abhijeet Bendre, Supriya Kumari, A. Franklin","doi":"10.1109/NetSoft54395.2022.9844033","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844033","url":null,"abstract":"Advancements in 5G and edge computing infrastructure increase the need to deploy location-based services for mission-critical applications like Vehicle to Everything (V2X) and Intelligent Transport System (ITS). In this demonstration, we showcase the location service capabilities of our 5G Core (5GC), coupled with Multi-access Edge Computing (MEC) for delay-sensitive ultra-Reliable Low Latency Communication (uRLLC) service types like V2X and ITS. We believe that this work will guide Mobile Network Operators in building a location assistance service system for emergencies and delay-critical applications.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125254028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Low-Latency and Energy-Efficient Frame Forwarding for vRAN Traffic 低时延、高能效的帧转发技术
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844046
Kouji Natori, Kei Fujimoto, A. Shiraga
Researchers have been investigating ways to implement signal processing functionality in radio access network with software in general-purpose servers, which is called virtualized Radio Access Network (vRAN). In implementing software in vRAN servers, the performance and efficiency gap between dedicated hardware and software in a general-purpose server must be considered to save power while meeting strict latency requirements. In this paper, we design and implement a frame forwarding system for vRAN traffic to meet three requirements: (A) low latency, (B) energy efficiency, and (C) microsecond-scale responsiveness, which means that low-latency and energy-efficiency solutions are reactive and effective for a microsecond time slot in vRAN traffic. In the proposed system, a user-space thread receives frames with busy polling to achieve low latency and can sleep to reduce power consumption when no frame arrives. In addition, a polling thread in our system reduces the overhead of waking up to keep up with vRAN traffic even when it is woken up just after starting to sleep. Our experiments show the proposed system meets latency requirements at a level comparable with an existing busy polling system and can reduce the power consumption more than the existing busy polling system for most traffic.
研究人员一直在研究如何在通用服务器上使用软件实现无线接入网中的信号处理功能,这被称为虚拟无线接入网(vRAN)。在vRAN服务器中实现软件时,必须考虑通用服务器中专用硬件与软件之间的性能和效率差距,以节省功耗,同时满足严格的延迟要求。在本文中,我们设计并实现了一种vRAN流量的帧转发系统,以满足以下三个要求:(a)低延迟,(B)能效,(C)微秒级响应,这意味着低延迟和能效的解决方案在微秒级时隙的vRAN流量中是被动和有效的。在该系统中,用户空间线程通过繁忙轮询接收帧以实现低延迟,并且在没有帧到达时可以休眠以减少功耗。此外,我们系统中的轮询线程减少了唤醒以跟上vRAN流量的开销,即使它刚开始睡眠就被唤醒。我们的实验表明,所提出的系统在与现有繁忙轮询系统相当的水平上满足延迟要求,并且在大多数流量下比现有繁忙轮询系统更能降低功耗。
{"title":"Low-Latency and Energy-Efficient Frame Forwarding for vRAN Traffic","authors":"Kouji Natori, Kei Fujimoto, A. Shiraga","doi":"10.1109/NetSoft54395.2022.9844046","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844046","url":null,"abstract":"Researchers have been investigating ways to implement signal processing functionality in radio access network with software in general-purpose servers, which is called virtualized Radio Access Network (vRAN). In implementing software in vRAN servers, the performance and efficiency gap between dedicated hardware and software in a general-purpose server must be considered to save power while meeting strict latency requirements. In this paper, we design and implement a frame forwarding system for vRAN traffic to meet three requirements: (A) low latency, (B) energy efficiency, and (C) microsecond-scale responsiveness, which means that low-latency and energy-efficiency solutions are reactive and effective for a microsecond time slot in vRAN traffic. In the proposed system, a user-space thread receives frames with busy polling to achieve low latency and can sleep to reduce power consumption when no frame arrives. In addition, a polling thread in our system reduces the overhead of waking up to keep up with vRAN traffic even when it is woken up just after starting to sleep. Our experiments show the proposed system meets latency requirements at a level comparable with an existing busy polling system and can reduce the power consumption more than the existing busy polling system for most traffic.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125957318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model-Driven Network Monitoring Using NetFlow Applied to Threat Detection 基于NetFlow的模型驱动网络监控在威胁检测中的应用
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844107
Daniel Gónzalez-Sánchez, I. D. Martinez-Casanueva, A. Pastor, Luis Bellido Triana, Cristina Pinar Muñoz Zamarro, Alejandro Antonio Moreno Sancho, David Fernández Cambronero, Diego R. López
In recent years, several research works have proposed the analysis of network flow information using machine learning in order to detect threats or anomalous activities. In this sense, NetFlow-based systems stand out as one of the main sources of network flow information. In these systems, NetFlow collectors provide the flow monitoring information to be analyzed, but the particular information structure and format provided by different collector implementations is a recurring problem. In this paper, a new YANG data model is proposed as a standard model to use NetFlow-based monitoring data. In order to validate the proposal, a NetFlow collector incorporating the proposed NetFlow YANG model has been developed, to be integrated in a network scenario in which network flows are analyzed to detect malicious cryptomining activity. This collector extends an existing one, and provides design patterns to incorporate other existing collectors into this common data model. Our results show how, by using the YANG modeling language, network flow information can be handled and aggregated in a formal and unified way that provides flexibility and facilitates data analysis applied to threat detection.
近年来,一些研究工作提出了使用机器学习分析网络流量信息以检测威胁或异常活动的方法。从这个意义上说,基于netflow的系统是网络流量信息的主要来源之一。在这些系统中,NetFlow收集器提供要分析的流量监控信息,但是不同收集器实现提供的特定信息结构和格式是一个反复出现的问题。本文提出了一种新的YANG数据模型,作为使用基于netflow的监测数据的标准模型。为了验证该建议,已经开发了一个包含所建议的NetFlow YANG模型的NetFlow收集器,将其集成到网络场景中,分析网络流以检测恶意加密挖掘活动。此收集器扩展了现有收集器,并提供了将其他现有收集器合并到此公共数据模型中的设计模式。我们的研究结果表明,通过使用YANG建模语言,网络流信息可以以一种正式和统一的方式处理和聚合,从而提供灵活性并促进应用于威胁检测的数据分析。
{"title":"Model-Driven Network Monitoring Using NetFlow Applied to Threat Detection","authors":"Daniel Gónzalez-Sánchez, I. D. Martinez-Casanueva, A. Pastor, Luis Bellido Triana, Cristina Pinar Muñoz Zamarro, Alejandro Antonio Moreno Sancho, David Fernández Cambronero, Diego R. López","doi":"10.1109/NetSoft54395.2022.9844107","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844107","url":null,"abstract":"In recent years, several research works have proposed the analysis of network flow information using machine learning in order to detect threats or anomalous activities. In this sense, NetFlow-based systems stand out as one of the main sources of network flow information. In these systems, NetFlow collectors provide the flow monitoring information to be analyzed, but the particular information structure and format provided by different collector implementations is a recurring problem. In this paper, a new YANG data model is proposed as a standard model to use NetFlow-based monitoring data. In order to validate the proposal, a NetFlow collector incorporating the proposed NetFlow YANG model has been developed, to be integrated in a network scenario in which network flows are analyzed to detect malicious cryptomining activity. This collector extends an existing one, and provides design patterns to incorporate other existing collectors into this common data model. Our results show how, by using the YANG modeling language, network flow information can be handled and aggregated in a formal and unified way that provides flexibility and facilitates data analysis applied to threat detection.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"9 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126109136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 IEEE 8th International Conference on Network Softwarization (NetSoft)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1